2017
DOI: 10.14569/ijacsa.2017.080814
|View full text |Cite
|
Sign up to set email alerts
|

A New Cryptosystem using Vigenere and Metaheuristics for RGB Pixel Shuffling

Abstract: Abstract-In this article we present a new approach using Vigenere and metaheuristics to resolve a problem of pixel shuffling to cipher an image. First the image is adapted to match the resolution system by transforming it to a list of intensities and coordinates. The idea is to use Vigenere encryption to maximize the confusion by widening the domain of intensities. Then, metaheuristics play the major role of encryption, generating an appropriate Meta key in order to shuffle the lists. Thus, both Vigenere key a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…2) Symmetrical Metaheuristics Ciphering Approach : Symmetrical metaheuristics ciphering is a new cipher system using Vigenere and metaheuristics [4]. The aim of the use of Vigenere encryption is to maximize the confusion and the use of metaheuristics helps generate a robust secret Meta-key.…”
Section: New Transport Layer Security Protocol Using Metaheuristicsmentioning
confidence: 99%
See 3 more Smart Citations
“…2) Symmetrical Metaheuristics Ciphering Approach : Symmetrical metaheuristics ciphering is a new cipher system using Vigenere and metaheuristics [4]. The aim of the use of Vigenere encryption is to maximize the confusion and the use of metaheuristics helps generate a robust secret Meta-key.…”
Section: New Transport Layer Security Protocol Using Metaheuristicsmentioning
confidence: 99%
“…2) TLSM record protocol : The TLSM consists of the following steps (Fig. 2 F1) is appended at the tail of C(F1), the result is encrypted by the symmetrical metaheuristics ciphering [4] using the first meta-key obtained from the handshake protocol , hence resulting in the encrypted data. 3) TLSM Key Exchange and Encryption Process : Before presenting the operations of the key exchange and encryption processes, the following adopted parameters should be defined:…”
Section: New Transport Layer Security Protocol Using Metaheuristicsmentioning
confidence: 99%
See 2 more Smart Citations